Your browser doesn't support javascript.
loading
CICIoT2023: A Real-Time Dataset and Benchmark for Large-Scale Attacks in IoT Environment.
Neto, Euclides Carlos Pinto; Dadkhah, Sajjad; Ferreira, Raphael; Zohourian, Alireza; Lu, Rongxing; Ghorbani, Ali A.
Afiliación
  • Neto ECP; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
  • Dadkhah S; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
  • Ferreira R; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
  • Zohourian A; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
  • Lu R; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
  • Ghorbani AA; Faculty of Computer Science, University of New Brunswick (UnB), Fredericton, NB E3B 5A3, Canada.
Sensors (Basel) ; 23(13)2023 Jun 26.
Article en En | MEDLINE | ID: mdl-37447792
ABSTRACT
Nowadays, the Internet of Things (IoT) concept plays a pivotal role in society and brings new capabilities to different industries. The number of IoT solutions in areas such as transportation and healthcare is increasing and new services are under development. In the last decade, society has experienced a drastic increase in IoT connections. In fact, IoT connections will increase in the next few years across different areas. Conversely, several challenges still need to be faced to enable efficient and secure operations (e.g., interoperability, security, and standards). Furthermore, although efforts have been made to produce datasets composed of attacks against IoT devices, several possible attacks are not considered. Most existing efforts do not consider an extensive network topology with real IoT devices. The main goal of this research is to propose a novel and extensive IoT attack dataset to foster the development of security analytics applications in real IoT operations. To accomplish this, 33 attacks are executed in an IoT topology composed of 105 devices. These attacks are classified into seven categories, namely DDoS, DoS, Recon, Web-based, brute force, spoofing, and Mirai. Finally, all attacks are executed by malicious IoT devices targeting other IoT devices. The dataset is available on the CIC Dataset website.
Asunto(s)
Palabras clave

Texto completo: 1 Colección: 01-internacional Banco de datos: MEDLINE Asunto principal: Benchmarking / Internet de las Cosas Idioma: En Revista: Sensors (Basel) Año: 2023 Tipo del documento: Article País de afiliación: Canadá

Texto completo: 1 Colección: 01-internacional Banco de datos: MEDLINE Asunto principal: Benchmarking / Internet de las Cosas Idioma: En Revista: Sensors (Basel) Año: 2023 Tipo del documento: Article País de afiliación: Canadá